• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Quantization and Event-Triggered Policy Design for Encrypted Networked Control

    2024-04-15 09:37:06YongxiaShiandEhsanNekouei
    IEEE/CAA Journal of Automatica Sinica 2024年4期

    Yongxia Shi and Ehsan Nekouei

    Abstract—This paper proposes a novel event-driven encrypted control framework for linear networked control systems (NCSs),which relies on two modified uniform quantization policies, the Paillier cryptosystem, and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem, both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods, where only the quantization of a single value, e.g., the control input or the system state, is considered.To handle this issue, static and dynamic quantization policies are presented, which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then, the quantized system state is encrypted and sent to the controller when the triggering condition, specified by a state-based event-triggered strategy, is satisfied.By doing so, not only the security and confidentiality of data transmitted over the communication network are protected, but also the ciphertext expansion phenomenon can be relieved.Additionally, by tactfully designing the quantization sensitivities and triggering error, the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally, a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results.

    I.INTRODUCTION

    A. Motivation

    NETWORKED control systems (NCSs) are ever-present in our societies by enabling critical systems and services such as intelligent transportation and smart grid systems.NCSs heavily rely on information and communication technologies for their operations [1].However, the widespread usage of communication networks and untrusted computing entities, e.g., cloud-based controllers, makes NCSs more vulnerable to cyber-attacks [2].For example, an adversary with access to sensor measurements of an NCS can easily extract sensitive information about the system.Therefore, it is crucial to address the security vulnerabilities of NCSs.

    The homomorphic encryption (HE) technique [3] provides a promising solution for the security of NCSs as it permits computations using encrypted sensor measurements without access to the actual measurements.Using HE, the sensor measurements of an NCS can be shared with untrusted computing entities over communication networks.In this case, even if the transmitted data, including sensor signals and control input,are eavesdropped by a malicious adversary, their actual values still remain unknown to the adversary.

    However, the common HE cryptosystems, such as ElGammal, Rivest-Shamir-Adleman (RSA), and Paillier, can only encrypt positive integers.Thus, any data required for computing the control law in an NCS must be quantized before encryption.However, quantization results in strong nonlinearity in the system, yielding system performance degradation and even instability.Moreover, HE methods suffer from ciphertext expansion, which undoubtedly increases the size of data transmitted over communication networks.Cyphertext expansion is a great challenge for NCSs due to their inherent resource limitations in terms of computation, communication,and storage [4].For instance, the high data rate requirement of HE cryptosystems might result in heavy channel congestion,thereby resulting in delays and packet dropouts.

    B. Contributions

    In this paper, we develop quantization and event-triggered policies to address the quantization and ciphertext expansion challenges of HE-based encrypted NCSs.The main contributions are three-fold:

    1) A novel dynamic quantization policy with a state-dependent sensitivity is presented.Different from traditional uniform quantizers with fixed sensitivity, which only ensure that the system state converges to a neighborhood of the equilibrium, the proposed quantization policy ensures asymptotic convergence of the system state.Besides, unlike uniform quantizers with time-varying sensitivity, the proposed dynamic quantization policy does not require an extra time sequence to update the sensitivity, which circumvents potential conflicts between sensitivity updating and triggering communication.

    2) By defining a quantization-related measurement error, the adverse effect of quantization errors is implicitly considered in the event-triggered strategy, which contributes to a rigorous analysis of the inter-event time interval.Moreover, an adjustable factor is introduced into the triggering condition,ensuring the validation and availability of the event-triggered strategy.

    3) An event-driven encrypted control framework is proposed using the Paillier cryptosystem, modified static and dynamic quantization policies, and the quantization-related event-triggered strategy.The strong nonlinearities caused by quantization and event triggering, including two coupled errors, are tactfully compensated by selecting proper parameters.It is shown that under the proposed event-triggered encrypted controller, the closed-loop system is secure and asymptotically stable.

    C. Related Work

    HE-based encrypted control of NCSs has been studied in[5]–[10].A pioneering encrypted control scheme was proposed in [5] to enhance the security of NCSs, based on multiplicative HE of RSA and EIGamal.Different problems related to HE-based encrypted control of NCSs have been studied in the literature, e.g., quantizer design and stability analysis [6],[7], observer-based encryption[8], and overflow/underflow of encrypted data [10].In particular, the quantizer design problem was first addressed in [6] and then was extended in [7], in which a stability-guaranteed dynamic ElGamal cryptosystem was developed.Furthermore, using the additively HE method,an encrypted distributed state observer was presented in [8], to enhance the privacy of the measurement data and estimated state.Kimet al.[9] provided a practice implementation over homomorphically encrypted data in an infinite time horizon using a dynamic feedback controller.To eliminate the overflow/underflow issue due to encryption, a secure and private control approach was proposed in [10], wherein the controller is reset periodically.

    The event-triggered control (ETC) method has been widely used to address the security of capacity-limited NCSs, such as faulty accommodation [11], anti-DoS attacks, deception attacks, sparse attacks [12]–[14], and privacy-preserving control [15].Moreover, the ETC scheme with quantized measurements has been extensively studied, especially using a uniform quantizer [16]–[19].For instance, by combining uniform quantization and the ETC strategy, the leader-following consensus problems for linear and Lipschitz nonlinear multiagent systems were addressed in [17].Taking external disturbances into account, two high-gain control laws with quantized relative states were designed in [18] to ensure the bounded consensus using event-triggered quantized communication protocols.Xuet al.[19] studied a unified distributed control method for linear networked systems with various quantizers, where the uniform quantization effect was analyzed in detail.However, due to the fixed quantization sensitivity in [16]–[19], only uniformly ultimately bounded stability of the system was ensured even without the external disturbance.

    What’s more, although a few researchers have studied event-based secure control issue of NCSs (like [11]–[15]), it is still rare to use encrypted networked control with the HE and ETC method, as it is in its infancy stage.Kishida [20] proposed a Paillier-type encrypted control scheme for the NCS using a uniform quantizer with a time-varying quantization sensitivity.Then, the proposed encrypted control law was extended to an event-triggered communication case.Later, the same event-triggered encrypted control problem was addressed in [21] using the ElGamal cryptosystem.Nevertheless,it should be pointed out that several deficiencies still exist in the existing event-based secure control schemes of NCSs, e.g.,potential conflicts between the quantizer and event-trigger updating and the nonzero phenomenon of the measurement error at the triggering time instant.

    Inspired by the aforementioned discussions, we develop a novel event-driven encrypted control framework for NCSs,including two modified uniform quantization policies, the Paillier cryptosystem, and an event-triggered strategy.Remarkably, to construct the HE-based encrypted control law,we need to quantize the system state and the control gain simultaneously.If two uniform quantizers (e.g., [16]–[19]) are directly used to quantize them, the control performance of closed-loop system will be severely deteriorated due to strong nonlinearities stemming from coupled quantization errors.In particular, such an adverse impact on the system performance would be further aggravated in the triggering communication scenario.Therefore, these research results in [16]–[19] can not be directly applicable to the HE-based encrypted control framework.To address this challenge, we propose static and dynamic quantization policies for the control gain and system states, respectively.By carefully selecting the quantization sensitivities, the proposed quantization policies not only achieve the desired integer conversions, but also guarantee the asymptotic convergence of the quantized system state to the equilibrium.On the other hand, in contrast to the time-varying quantization policy in [20], our dynamic quantization policy does not require additional time instances to update the quantizer’s sensitivity.This is particularly important for practical implementations as it avoids potential conflicts between triggering communications and sensitivity updating.Additionally, we use the quantized system state to define the measurement error in the event-triggered strategy, which ensures the measurement error can be set to zero when specific events occur.Different from the event-triggered policy in [20], [21],the adverse effects caused by quantization errors are implicitly considered in the triggering condition, and a more rigorous analysis of the inter-event time interval is provided in our work.

    D. Organization

    The rest of this paper is organized as follows.Section II provides the preliminary technical background and formulates the encrypted control problem.Section III discusses the event-driven encrypted control algorithm, including the design of quantization and event-trigger policies.The simulation results are provided in Section IV.Finally, concluding remarks are given in Section V.

    E. Notations

    Let R, Z, and Z+be sets of the real numbers, integers, and non-negative integers, respectively.Denote Rnand Rn×mas sets of then-dimension column vector andn×mreal matrix.Let Z+n:={z∈Z:0 ≤z

    II.PRELIMINARIES AND PROBLEM FORMULATION

    In this section, we first revisit the Paillier cryptosystem and the uniform quantizer.Then, the encrypted networked control problem is formulated.

    A. Paillier Cryptosystem

    The Paillier encryption includes three steps, i.e., key generation (Gen), encryption (Enc), and decryption (Dec).The detailed operations are as follows [20]:

    1)Gen

    a) Choose two large prime numberspandqrandomly such that gcd(pq,(p-1)(q-1)) = 1, where gcd(a,b) stands for the greatest common divisor of any positive integersaandb;

    b) Generate the public key (N,g), whereN=pqandg∈is a random integer;

    c) Generate the private key (λ,μ), whereλ=lcm(p-1,q-1), μ=λ-1modN, lcm(a,b) is the least common multiple of any positive integersaandb, and mod is the modulo operation.

    2)Enc

    a) Select randomr∈Z?N:={x∈Z+N|gcd(x,N)=1};

    b) Given a plaintext messagem∈Z+N, construct its ciphertext asc=Enc(m)=gm·rNmodN2.

    3) Dec

    B. Uniform Quantizer

    Since the data related to the practical NCSs, such as the sensor measurements and control gain, are usually real numbers,they must be quantized before encryption.For any real numberx∈R , a uniform quantizerqu(x):R →Z is defined as [22]

    Similarly, the quantization error of vectorv(i.e.,v?=v-?qu(v) ) and the quantization error of matrixS(i.e.,S? =S-?qu(S)) can be upper bounded as

    C. Problem Formulation

    Consider the linear networked control system

    wheret∈Z+is the time index,x(t)∈Rnis the system state,u(t)∈Rmdenotes the control input,A∈Rn×nandB∈Rn×mare the constant matrices.If the matrix pair (A,B) is controllable,the system (6) can be stabilized by implementing the statefeedback control law

    whereK∈Rm×nis the control gain matrix.As illustrated in Fig.1, the control input signal (7) is computed by a networked controller according to the state measurements.A malicious adversary can directly obtain sensitive state measurements by eavesdropping the communication channels.Moreover, the controller may be implemented using an untrusted computing entity, e.g., a cloud-based controller.Since valuable information can be inferred from the state measurements or the control input signal, the security and privacy of the system may be compromised.Hence, this paper focuses on the secure control problem of NCSs, stated as Problem 1.

    Fig.1.The NCSs subject to possible eavesdropping attacks.

    Problem 1: Develop an encrypted control framework for the linear networked system (6), including a static quantization policy for the control gainKand a state-based dynamic quantization policy for the system statex(t), and an event-triggered policy to achieve the following objectives:

    1) Ensuring the asymptotic stability of the closed-loop system;

    2) Preserving the security of the data shared through the communication network;

    3) Reducing data transmissions over the communication network between the plant and the controller.

    Lemma 2[23]: Consider the linear networked system (6)with the state-feedback control law (7).If the matrix pair(A,B)is controllable, for any given symmetric and positivedefinite matrixQ∈Rn×n, there existsP=PT∈Rn×n>0 satisfying

    Assumption 1: For the networked control system (6) with state-feedback control law (7), (A,B) is controllable.

    Remark 1: Given that the Paillier cryptosystem only operates positive integers, all data used for computing the networked control law necessitate integer conversions.Hence,the purpose of employing uniform quantizers in this paper is to map the real-valued system state and control gain into proper integer values.Although the uniform quantizer itself distorts the original signal, protecting data only through quantization seems impracticable as the variation trend of the original signal remains unchanged after quantization.Thus, the security enhancement of the NCS still relies on the usage of the Paillier cryptosystem.

    III.MAIN RESULTS

    In this section, a novel encrypted networked control framework is proposed, as shown in Fig.2.First, we design the static and dynamic quantization policies to quantize the control gainKand the system statex(t), respectively.Remarkably, the main purpose of the quantization is to convert the real-valued control gain and system state into integers since only integers can be encrypted in the Paillier cryptosystem.Then, a state-based event-triggered strategy is developed for scheduling the transmission of the quantized system state before encryption.Based on this, an encrypted networked controller is constructed.Finally, the inter-event time interval under the proposed event-triggered policy is analyzed.The detailed design and analysis procedures are introduced below.

    Fig.2.The proposed encrypted networked control scheme, where (E (u+) is the encrypted control law computed by the networked controller, u + is the decrypted result of E (u+) , and u (t) is actual control command executed on the actuator.

    A. Quantization Policy Design

    1)Quantization for the Control Gain Matrix

    Based on the description in Section II,Kis the control gain matrix in (7) and satisfies (8).Letqu(K) be a uniform quantizer ofKwith the sensitivity ?K>0.Then, the static quantization policy for the uniform quantizerqu(K) is designed such that ?Ksatisfies

    wherePandQare positive-define matrices in (8).

    which directly implies

    In summary, as long as ?Kis determined by (9), it is straightforward to infer from (13) that the linear networked system (6) is asymptotic stable.

    Additionally, based on Theorem 1, there exists symmetric positive-define matricesPˉ andQˉ such that

    which is a discrete Lyapunov equation and will be used in the design of the quantization policy for the system state.

    2)Quantization for the System State

    Letqu(x) denote a uniform quantizer of the system statexwith the sensitivity ?x>0.Then, the state-dependent dynamic quantization policy is designed such that

    with

    Fig.3.Comparison of quantization errors.

    B. Event-Triggered Strategy

    where inf(·) is the infimum operation, the initial triggering instant ist1=0, andF(t) is the triggering function given by

    with an adjustable factor

    where ε>0 is a position constant.Note that the proposed event-triggered strategy (22) is Zeno-free, thus it is executable.The detailed analysis of the inter-event time interval of (22) is provided in the later part of this section.

    C. Encrypted Control Law

    The detailed implementation of the proposed encrypted control scheme is summarized in Algorithm 1, where Dp(·) is the Paillier-based decryption operation.

    Algorithm 1 The Implementation of the Proposed Encrypted Control Scheme With Static and Dynamic Quantizers and the Event-Triggered Policy p,q,g,rk,K,Q, ˉQ, ˉQx Initialize: choose Ensure:1: /*Parameter computation*/2: Compute P according to (8)3: /*Static quantization*/?K u(t)4: Select so that (9) holds qu(K) ˉK 5: Compute andˉP 6: Compute according to (14)7: /*Dynamic quantization*/8: Compute σ and select such that (15) holds qu(x)?x 9: ObtainˉPx 10: Compute according to (21)11: /*Event trigger*/12: Compute β based on (24)t=tk+i,i=1,...13: for do F(t)14: Calculate using (23)F(t)≥0 15: if then 16: Determine by (22)tk=tk+1 tk+1 17:18:e(t)=0 19: Update 20: end if 21: end for 22: /*Encryption*/qu(K) rk qu(x(tk))23: Encrypt using a random positive integer qu(x(tk))24: Encrypt using Paillier encryption Erk(qu(K)) EP(qu(x(tk)))25: Transmit and to the controller node 26: /*Controller*/E(u+)27: Compute the encrypted controller as per (25)E(u+)28: Transmit to the plant node 30: Compute 29: /*Decryption*/u+ = -Dp(Drk(E(u+)))= -Drk(Erk(qu(K))qu(x(tk))) =-qu(K)qu(x(tk))31: /*Scaling*/u(t)=-ˉKˉx(tk)32: Obtain and implement

    Theorem 3: Consider the linear networked system (6) and suppose that there is no saturation occurrence in the uniform quantizer.Implementing the encrypted control law (25) with the event-triggered strategy (22) following Algorithm 1, the control objectives stated in Problem 1 are achieved.

    Proof: Benefiting from the homomorphic property of Paillier encryption, we haveu(t)=?K?xu+.Thus, the actual control commandu(t) executed on the actuator is represented by

    Therefore, the linear networked system (6) now becomes

    Therefore, the closed-loop control system under the proposed encrypted control scheme is asymptotically stable.Moreover, under the event-triggered policy, the system state is encrypted and transmitted only when the specific triggering condition is fulfilled, which contributes to communication load reduction.Furthermore, the data security during network transmissions is clarified by Remark 2.■

    Remark 2: According to Fig.2 and Algorithm 1, all data transmitted over the communication network, i.e., the system state, control gain, and control input signal, have been encrypted before transmission.Since the private key is exclusively known by the plant, no sensitive information, particularly the system state and controller signal, can be leaked even in the presence of network eavesdroppers and malicious adversities, which ensures the security and confidentiality of data shared through the communication channel.

    Remark 3: Considering the design process of the encrypted networked control scheme, we present the static, dynamic quantization policies, the event-triggered strategy, and the encrypted control law successively.Combining the proof of each theorem, it is easily observed that Theorem 2 is obtained based on the premise of a discrete Lyapunov equation (14)generated from Theorem 1.Similarly, the discrete Lyapunov equation (21) generated by Theorem 2 is used to construct the event-triggered strategy (22), which drives the encrypted control law (25).Hence, Theorem 1 is a prerequisite for Theorem 2,and Theorem 2 is a prerequisite for Theorem 3.

    D. Inter-Event Time Interval Analysis

    IV.SIMULATION EXAMPLE

    In this section, the encrypted control of an inverted pendulum cart system shown in Fig.4 is considered as an example to validate the efficiency of the proposed event-driven encrypted control framework.The motion equation of the inverted pendulum cart system is described by [25]

    Fig.4.The schematic of an inverted pendulum cart system.

    A. Effectiveness Verification

    Figs.5 and 6 show the state trajectories and the actual control commands for the encrypted control law (25) (denoted as“w/ encryption”) and unencrypted control law (7) (denoted as“w/o encryption”), respectively.These two figures confirm that the asymptotic stability and control performance of the encrypted control system are similar to those of the unencrypted control system.The triggering release instants and the inter-event triggering intervals under the proposed event-triggered strategy (22) are plotted in Fig.7, where the triggering number, minimum, and maximum triggering intervals, are 165, 2 and 15, respectively.

    Fig.5.State trajectories under the encrypted and unencrypted control systems.

    Fig.6.Control command under the encrypted and unencrypted control systems.

    Fig.7.The triggering instant and inter-event interval.

    Fig.8.Comparison of the energy consumption between the encrypted and unencrypted control systems.

    Fig.9.Comparison of the communication size between the encrypted and unencrypted control systems.

    Fig.8 depicts the energy consumption of the encrypted and unencrypted control systems.In Fig.9, we show the communication size for the unencrypted control system (denoted as“w/o encryption”), the proposed event-driven encrypted control system (denoted as “w/ encryption”), and the encrypted control system without an event-triggered policy (denoted as“w/ encryption w/o trigger”).The unencrypted control system only requires 4-byte to communicate each variable or parameter, while the Paillier encryption scheme requires 8-byte to communicate each variable.In this case, the sizes of data transmitted over the communication network under the proposed encrypted control law (25) and unencrypted control law(7) are 6616 bytes and 20 016 bytes, respectively.Without consideration of the event-triggered policy (“w/ encryption w/o trigger”), the system requires 40 016 bytes to transmit the encrypted data.Therefore, the total size of data transmitted over the communication network is significantly reduced under the proposed event-triggered encrypted control scheme.Moreover, combining Fig.8 with Fig.9, the proposed encrypted control scheme increases the energy consumption by nearly 3.34%, while reducing the communication size by 66.95%compared with those under the unencrypted control law, which indicates it is still resource-efficient.

    The encrypted system states and control law are depicted in Figs.10 and 11, respectively.As can be seen, there is no correlation exists between the original/actual data (Figs.5 and 6)and the encrypted data (Figs.10 and 11).Therefore, the sensitive state measurements and the control input signal transmitted over the communication network are well protected.

    Fig.10.The encrypted system states of the system.

    Fig.11.The encrypted control law of the system.

    B. Comparison With the Existing Method

    It is worth noting that [20] addressed the same event-triggered encrypted control problem of NCSs as our work.Specifically, the Paillier cryptosystem, uniform quantizer, and eventtriggered control method were utilized to construct the encrypted controller.Hence, the encrypted control scheme in[20] is simulated as a comparative example, named “The compared method”.To ensure a fair comparison, the system parameters and control-related matrices remain unchanged with subsection A.However, in order to maintain the scaling factor ? ∈(0,1) as specified in [20], the saturation value of the uniform quantizer for the system state is increased to 50 000.Due to space limitations, we have omitted the encrypted system states and control law.

    Fig.12 shows the state trajectories under these two encrypted control schemes.It is evident from Fig.12 that both schemes ensure the asymptotic stability of the system.However, the proposed method in this paper exhibits a better transient control performance, contributing to smoother control command and less energy consumption, as depicted in Fig.13.In Fig.14, the updating time instant and interval of the timevarying quantizer in [20] are plotted, with a total of 89 updates.It is important to note that the event-triggered condition in [20] heavily relies on a parameter Θ used in the timevarying quantizer, and the triggering error can not be reset to zero at every triggering instant.In our simulation setting, we have Θ ≈400.In this case, the event-triggered condition in[20] can be always satisfied.As a result, although the updating number of the time-varying quantizer is reduced, it results in a large number of triggering instances, which implies that the size of data transmitted over the communication work in[20] amounts to 40 016 bytes.Overall, in contrast to the encrypted control scheme in [20], the encrypted control scheme proposed in this paper reduces the energy consumption by 7 8.39% and reduces communication size by 8 3.47%.

    Fig.12.State trajectories under two encrypted control schemes.

    V.CONCLUSION

    In this paper, a novel event-driven encrypted control framework of NCSs was proposed using semi-homomorphic encryption.By designing the quantization policies with the static and dynamic sensitivities, the bounded quantization error inherent in the traditional fixed-sensitivity uniform quantizer was tactfully compensated, contributing to the system state’s asymptotic convergence.Moreover, an event-triggered strategy was developed to reduce the communication consumption of NCSs and relieve ciphertext expansion.With the aid of static/dynamic quantization policies, event-triggered strategy, and Paillier encryption, the asymptotic stability and the data security of NCSs are ensured simultaneously.Finally,the validity of the proposed encrypted control framework was investigated through a numerical example of motion control of an inverted pendulum cart system.Future work will focus on the secure control problem of NCSs subject to more practical constraints, such as parameter uncertainties and exogenous disturbances.

    Fig.13.Comparisons of control command and energy under two encrypted control schemes.

    Fig.14.The updating instant and updating interval of time-varying quantizer in [20].

    欧美少妇被猛烈插入视频| 极品少妇高潮喷水抽搐| 国产精品二区激情视频| 在线观看免费日韩欧美大片| 一级毛片电影观看| 午夜91福利影院| 免费看av在线观看网站| 国产不卡av网站在线观看| 欧美日韩一区二区视频在线观看视频在线| 亚洲成国产人片在线观看| 日日摸夜夜添夜夜爱| 麻豆精品久久久久久蜜桃| 巨乳人妻的诱惑在线观看| 99国产综合亚洲精品| 日本av免费视频播放| 亚洲内射少妇av| 一级毛片我不卡| 熟妇人妻不卡中文字幕| 黄色配什么色好看| 搡女人真爽免费视频火全软件| 校园人妻丝袜中文字幕| 国产欧美日韩一区二区三区在线| 五月开心婷婷网| av免费观看日本| 青青草视频在线视频观看| 亚洲三区欧美一区| 亚洲男人天堂网一区| 国产精品 国内视频| 99久久中文字幕三级久久日本| 男男h啪啪无遮挡| 欧美成人精品欧美一级黄| 亚洲国产精品999| 1024视频免费在线观看| 亚洲精品国产色婷婷电影| 五月天丁香电影| 国产欧美日韩一区二区三区在线| 黑丝袜美女国产一区| 哪个播放器可以免费观看大片| 精品第一国产精品| 亚洲国产欧美日韩在线播放| 亚洲中文av在线| 免费高清在线观看视频在线观看| 国产成人av激情在线播放| 麻豆乱淫一区二区| 1024香蕉在线观看| 91aial.com中文字幕在线观看| 久久ye,这里只有精品| 免费在线观看视频国产中文字幕亚洲 | 丰满少妇做爰视频| 久久久国产欧美日韩av| 男的添女的下面高潮视频| 欧美精品国产亚洲| 亚洲精品第二区| 考比视频在线观看| 丝袜人妻中文字幕| 人人妻人人添人人爽欧美一区卜| 成年av动漫网址| 精品酒店卫生间| 看非洲黑人一级黄片| 久久青草综合色| 国产精品久久久久久精品古装| 尾随美女入室| 最黄视频免费看| av国产精品久久久久影院| 国产成人欧美| 免费大片黄手机在线观看| 香蕉国产在线看| 久久热在线av| 久久久久久久国产电影| 中文字幕另类日韩欧美亚洲嫩草| 中国三级夫妇交换| 国产精品99久久99久久久不卡 | 满18在线观看网站| 日本猛色少妇xxxxx猛交久久| 在线 av 中文字幕| 少妇的逼水好多| 伊人亚洲综合成人网| 大片电影免费在线观看免费| 少妇熟女欧美另类| 国产探花极品一区二区| 亚洲av男天堂| 欧美人与性动交α欧美软件| 久久这里有精品视频免费| 91午夜精品亚洲一区二区三区| 男女高潮啪啪啪动态图| 亚洲国产欧美日韩在线播放| 中文字幕另类日韩欧美亚洲嫩草| 男女高潮啪啪啪动态图| 精品国产超薄肉色丝袜足j| 亚洲久久久国产精品| 亚洲熟女精品中文字幕| 丰满少妇做爰视频| 国产午夜精品一二区理论片| 亚洲天堂av无毛| 日日摸夜夜添夜夜爱| 亚洲美女搞黄在线观看| 亚洲一码二码三码区别大吗| 国产日韩一区二区三区精品不卡| 午夜精品国产一区二区电影| 久久精品人人爽人人爽视色| 日韩一卡2卡3卡4卡2021年| 99久久精品国产国产毛片| 国产精品久久久av美女十八| 亚洲av中文av极速乱| 久久热在线av| 亚洲av在线观看美女高潮| 免费观看在线日韩| 国产精品 欧美亚洲| 99热全是精品| 九草在线视频观看| 各种免费的搞黄视频| 国产精品熟女久久久久浪| 男人添女人高潮全过程视频| 久久久久久久久久久久大奶| 91在线精品国自产拍蜜月| 天天躁夜夜躁狠狠躁躁| 国产成人精品无人区| 久久久精品94久久精品| 欧美成人精品欧美一级黄| 欧美最新免费一区二区三区| 啦啦啦在线观看免费高清www| 国产成人aa在线观看| 蜜桃在线观看..| 亚洲熟女精品中文字幕| 欧美人与性动交α欧美软件| 亚洲国产精品999| 少妇被粗大猛烈的视频| 国产老妇伦熟女老妇高清| 午夜福利一区二区在线看| 汤姆久久久久久久影院中文字幕| av在线播放精品| 老熟女久久久| 午夜福利网站1000一区二区三区| 天堂8中文在线网| 18禁观看日本| 一级片免费观看大全| 亚洲av电影在线观看一区二区三区| 妹子高潮喷水视频| 日本免费在线观看一区| 亚洲av电影在线观看一区二区三区| 亚洲国产欧美日韩在线播放| 国产av精品麻豆| 中文精品一卡2卡3卡4更新| 侵犯人妻中文字幕一二三四区| 亚洲成av片中文字幕在线观看 | 欧美成人午夜精品| 久久国产精品大桥未久av| 国产一区亚洲一区在线观看| 国产亚洲一区二区精品| 欧美日韩综合久久久久久| xxx大片免费视频| 一边摸一边做爽爽视频免费| 国产一区二区三区综合在线观看| 中文字幕色久视频| 久久久久国产精品人妻一区二区| videosex国产| xxx大片免费视频| 人妻系列 视频| 女人久久www免费人成看片| 一本—道久久a久久精品蜜桃钙片| 国产精品嫩草影院av在线观看| 久久久精品免费免费高清| 国产精品一国产av| 咕卡用的链子| 久久毛片免费看一区二区三区| 一区在线观看完整版| 亚洲国产欧美网| 男女无遮挡免费网站观看| 欧美日韩成人在线一区二区| 性色avwww在线观看| 久久婷婷青草| 久久精品国产自在天天线| 人妻人人澡人人爽人人| 在线精品无人区一区二区三| 精品午夜福利在线看| 秋霞在线观看毛片| 99精国产麻豆久久婷婷| 欧美精品av麻豆av| 久久久国产欧美日韩av| 大香蕉久久成人网| 我要看黄色一级片免费的| 国产av一区二区精品久久| 成人黄色视频免费在线看| 一级毛片我不卡| 另类亚洲欧美激情| 亚洲av.av天堂| 久久人人爽人人片av| 大香蕉久久网| 国产片内射在线| 午夜精品国产一区二区电影| 亚洲av国产av综合av卡| 婷婷色综合www| 18+在线观看网站| 成人国产麻豆网| 咕卡用的链子| 亚洲国产精品999| 国产成人免费观看mmmm| 99热全是精品| 最近最新中文字幕大全免费视频 | 日韩大片免费观看网站| 黄色 视频免费看| 你懂的网址亚洲精品在线观看| 久久影院123| 精品亚洲乱码少妇综合久久| 街头女战士在线观看网站| 日韩欧美精品免费久久| 亚洲在久久综合| 久久久久视频综合| 中文字幕亚洲精品专区| 久久99一区二区三区| 久久久久久久久免费视频了| 成年女人在线观看亚洲视频| 日本wwww免费看| 最近2019中文字幕mv第一页| 99精国产麻豆久久婷婷| 制服人妻中文乱码| 青春草视频在线免费观看| 久久精品亚洲av国产电影网| 老司机影院成人| 精品人妻熟女毛片av久久网站| 少妇的丰满在线观看| 丰满饥渴人妻一区二区三| 国产熟女欧美一区二区| 亚洲,一卡二卡三卡| 美女午夜性视频免费| 国产熟女午夜一区二区三区| 最近的中文字幕免费完整| 五月开心婷婷网| 激情五月婷婷亚洲| 老熟女久久久| 观看av在线不卡| 国产片特级美女逼逼视频| 久久久久国产网址| 男女高潮啪啪啪动态图| 日本欧美视频一区| 菩萨蛮人人尽说江南好唐韦庄| 国产精品免费视频内射| 狠狠婷婷综合久久久久久88av| 国产日韩一区二区三区精品不卡| 亚洲国产看品久久| 亚洲综合色惰| 久久久久久人妻| 日韩一本色道免费dvd| videossex国产| 亚洲,欧美精品.| 精品一区二区三区四区五区乱码 | 伦理电影免费视频| 老女人水多毛片| 香蕉国产在线看| av女优亚洲男人天堂| 久久久久久久久久久免费av| 久久久久久久久免费视频了| 久久毛片免费看一区二区三区| 七月丁香在线播放| 久久人人97超碰香蕉20202| 男女啪啪激烈高潮av片| 美国免费a级毛片| 深夜精品福利| www.熟女人妻精品国产| 久久国产精品男人的天堂亚洲| 少妇被粗大猛烈的视频| 亚洲精品中文字幕在线视频| 天天躁夜夜躁狠狠久久av| 久久精品国产综合久久久| 亚洲男人天堂网一区| 又粗又硬又长又爽又黄的视频| 中文字幕亚洲精品专区| 制服诱惑二区| 国产乱来视频区| 制服丝袜香蕉在线| 亚洲国产最新在线播放| 亚洲精品美女久久av网站| 男女边吃奶边做爰视频| 久久狼人影院| 亚洲成国产人片在线观看| 国产欧美日韩一区二区三区在线| 香蕉国产在线看| 欧美日韩av久久| 黑丝袜美女国产一区| 校园人妻丝袜中文字幕| 人妻 亚洲 视频| 日韩三级伦理在线观看| 国产乱人偷精品视频| 欧美精品一区二区免费开放| 在线免费观看不下载黄p国产| 中文字幕人妻丝袜制服| 午夜日韩欧美国产| 五月开心婷婷网| 美女xxoo啪啪120秒动态图| 精品国产一区二区三区四区第35| 亚洲精品乱久久久久久| 97在线人人人人妻| 亚洲伊人久久精品综合| 香蕉精品网在线| 汤姆久久久久久久影院中文字幕| 久久久久国产精品人妻一区二区| 天天躁夜夜躁狠狠久久av| 春色校园在线视频观看| 亚洲成色77777| 黄色怎么调成土黄色| 久热这里只有精品99| 亚洲一级一片aⅴ在线观看| 久久久久久久国产电影| 看非洲黑人一级黄片| 国产亚洲一区二区精品| 在线观看免费日韩欧美大片| 三级国产精品片| 欧美xxⅹ黑人| 不卡av一区二区三区| 亚洲经典国产精华液单| 精品少妇内射三级| 久久久国产精品麻豆| 久久久久久久久免费视频了| 国产成人午夜福利电影在线观看| 欧美另类一区| 80岁老熟妇乱子伦牲交| 国产男女内射视频| 成年动漫av网址| 国产97色在线日韩免费| av在线app专区| 中文字幕人妻熟女乱码| 国产精品蜜桃在线观看| 日韩中字成人| 女的被弄到高潮叫床怎么办| 美女主播在线视频| 欧美日韩亚洲高清精品| 26uuu在线亚洲综合色| 婷婷色av中文字幕| 街头女战士在线观看网站| 在线免费观看不下载黄p国产| 国产成人精品无人区| 亚洲欧美清纯卡通| 香蕉丝袜av| 99久久综合免费| 黄色配什么色好看| 91精品国产国语对白视频| 亚洲在久久综合| 丰满迷人的少妇在线观看| 亚洲精品久久成人aⅴ小说| 各种免费的搞黄视频| 男女午夜视频在线观看| 日本vs欧美在线观看视频| 伊人久久大香线蕉亚洲五| 日韩中字成人| 久久久久久人妻| 久久精品国产自在天天线| 国产成人欧美| 国产熟女午夜一区二区三区| 高清视频免费观看一区二区| 我的亚洲天堂| 国产在线视频一区二区| 黄色毛片三级朝国网站| 亚洲成av片中文字幕在线观看 | 日韩视频在线欧美| 免费久久久久久久精品成人欧美视频| 巨乳人妻的诱惑在线观看| 免费不卡的大黄色大毛片视频在线观看| 久久精品国产亚洲av天美| 视频区图区小说| 欧美成人精品欧美一级黄| av免费观看日本| 美女视频免费永久观看网站| 久久精品国产自在天天线| 亚洲国产欧美日韩在线播放| 国产极品粉嫩免费观看在线| 自线自在国产av| 成人国产麻豆网| 熟妇人妻不卡中文字幕| 国产成人91sexporn| 国产深夜福利视频在线观看| 久久久久久伊人网av| 乱人伦中国视频| 国产精品秋霞免费鲁丝片| 韩国精品一区二区三区| 国产成人免费观看mmmm| 久久久久久久亚洲中文字幕| 精品久久久久久电影网| 国产日韩欧美亚洲二区| 亚洲成国产人片在线观看| 久久久a久久爽久久v久久| 久久久久久伊人网av| 男女午夜视频在线观看| 777米奇影视久久| 亚洲欧美色中文字幕在线| xxx大片免费视频| 国产色婷婷99| 久久久精品94久久精品| 欧美黄色片欧美黄色片| 亚洲色图综合在线观看| 亚洲在久久综合| 亚洲 欧美一区二区三区| 黄色配什么色好看| 王馨瑶露胸无遮挡在线观看| 日本-黄色视频高清免费观看| 2021少妇久久久久久久久久久| 成年美女黄网站色视频大全免费| 曰老女人黄片| av在线观看视频网站免费| 三级国产精品片| 国产精品无大码| 久久久久久免费高清国产稀缺| 国产 一区精品| 飞空精品影院首页| 日韩一卡2卡3卡4卡2021年| 91成人精品电影| 精品久久蜜臀av无| 久久这里有精品视频免费| 国产片内射在线| 亚洲国产精品999| 我的亚洲天堂| 亚洲成色77777| 美国免费a级毛片| 寂寞人妻少妇视频99o| 色婷婷久久久亚洲欧美| 日韩av在线免费看完整版不卡| 欧美成人午夜精品| 少妇被粗大猛烈的视频| 精品亚洲成a人片在线观看| 国产精品亚洲av一区麻豆 | 男女免费视频国产| 一级黄片播放器| 91aial.com中文字幕在线观看| 晚上一个人看的免费电影| 国产欧美日韩综合在线一区二区| 国产乱人偷精品视频| 各种免费的搞黄视频| 国产精品香港三级国产av潘金莲 | 色吧在线观看| 一区福利在线观看| 久久久久久久久免费视频了| 久久久久久久久久久免费av| 2021少妇久久久久久久久久久| 人成视频在线观看免费观看| 三级国产精品片| 观看av在线不卡| 亚洲av在线观看美女高潮| 国产精品亚洲av一区麻豆 | 天天操日日干夜夜撸| 秋霞在线观看毛片| 欧美bdsm另类| 亚洲少妇的诱惑av| 久久久国产一区二区| 免费看不卡的av| 亚洲精品久久午夜乱码| 国产男女超爽视频在线观看| 免费日韩欧美在线观看| 免费高清在线观看视频在线观看| 999久久久国产精品视频| 少妇人妻久久综合中文| 男女无遮挡免费网站观看| 搡老乐熟女国产| 精品少妇黑人巨大在线播放| 亚洲欧美一区二区三区久久| 亚洲av欧美aⅴ国产| 麻豆乱淫一区二区| 亚洲欧美成人综合另类久久久| av在线app专区| 高清av免费在线| 宅男免费午夜| 亚洲成人手机| 国产福利在线免费观看视频| 韩国av在线不卡| 成人黄色视频免费在线看| 亚洲伊人色综图| 精品久久蜜臀av无| 亚洲,欧美精品.| 国产免费视频播放在线视频| 国产成人精品久久久久久| 欧美精品亚洲一区二区| 国产一区二区三区av在线| 亚洲美女搞黄在线观看| 欧美日韩亚洲国产一区二区在线观看 | av天堂久久9| 十八禁网站网址无遮挡| 亚洲精品国产av成人精品| 久久久亚洲精品成人影院| 国产欧美日韩综合在线一区二区| 伊人久久大香线蕉亚洲五| av又黄又爽大尺度在线免费看| 久久精品aⅴ一区二区三区四区 | 午夜福利乱码中文字幕| 在线观看美女被高潮喷水网站| 久久女婷五月综合色啪小说| 女性被躁到高潮视频| 在线观看免费日韩欧美大片| 亚洲国产精品国产精品| 欧美国产精品一级二级三级| 欧美激情极品国产一区二区三区| av不卡在线播放| 亚洲精品久久久久久婷婷小说| 欧美成人精品欧美一级黄| 中国三级夫妇交换| 亚洲欧美成人精品一区二区| 好男人视频免费观看在线| 中文天堂在线官网| 香蕉精品网在线| 亚洲精品乱久久久久久| 亚洲,欧美精品.| 亚洲婷婷狠狠爱综合网| 日韩一本色道免费dvd| 久久久久久久大尺度免费视频| 久久久久视频综合| 亚洲男人天堂网一区| 咕卡用的链子| 婷婷色麻豆天堂久久| 伊人久久大香线蕉亚洲五| 欧美日韩亚洲国产一区二区在线观看 | 国产日韩一区二区三区精品不卡| 午夜福利在线免费观看网站| 一二三四在线观看免费中文在| av免费观看日本| 一级爰片在线观看| 色视频在线一区二区三区| 国产有黄有色有爽视频| 三级国产精品片| 精品一区二区免费观看| 久久久欧美国产精品| 国产精品久久久久久av不卡| a级毛片在线看网站| 久久久久久久国产电影| 国产精品免费大片| av有码第一页| 9热在线视频观看99| 日韩中字成人| 日韩精品免费视频一区二区三区| 啦啦啦在线免费观看视频4| 满18在线观看网站| 晚上一个人看的免费电影| 国产男人的电影天堂91| 久久鲁丝午夜福利片| 国产精品嫩草影院av在线观看| 制服诱惑二区| 国产又爽黄色视频| 久久99热这里只频精品6学生| 中文字幕另类日韩欧美亚洲嫩草| 在线观看www视频免费| 中国三级夫妇交换| 国产精品二区激情视频| 热99国产精品久久久久久7| 在线观看免费日韩欧美大片| av在线老鸭窝| 日本av手机在线免费观看| 亚洲国产精品一区二区三区在线| 国产精品久久久久久久久免| av又黄又爽大尺度在线免费看| 91精品三级在线观看| 免费日韩欧美在线观看| 国产熟女午夜一区二区三区| 国产淫语在线视频| 亚洲,一卡二卡三卡| 成人毛片a级毛片在线播放| 乱人伦中国视频| 欧美另类一区| 成人亚洲欧美一区二区av| 韩国av在线不卡| 99久久中文字幕三级久久日本| 国产毛片在线视频| 在现免费观看毛片| 欧美bdsm另类| 少妇的逼水好多| 欧美日韩国产mv在线观看视频| 18在线观看网站| 精品亚洲成国产av| 国产成人av激情在线播放| 制服丝袜香蕉在线| 久久久久久久国产电影| 久久久精品94久久精品| 成人亚洲欧美一区二区av| 建设人人有责人人尽责人人享有的| 成人国产av品久久久| 国产男女超爽视频在线观看| 麻豆精品久久久久久蜜桃| 久久久久视频综合| 亚洲国产日韩一区二区| 人妻少妇偷人精品九色| 视频区图区小说| 国产又色又爽无遮挡免| 精品久久久精品久久久| 国产 一区精品| av在线老鸭窝| 国产av国产精品国产| 男女啪啪激烈高潮av片| 国产亚洲精品第一综合不卡| 黄色怎么调成土黄色| 欧美精品人与动牲交sv欧美| 亚洲国产精品国产精品| 人人澡人人妻人| 亚洲精品aⅴ在线观看| 婷婷成人精品国产| 成年女人毛片免费观看观看9 | 成人二区视频| 国产精品免费大片| 久久国产精品大桥未久av| 在线观看www视频免费| 大片电影免费在线观看免费| 色94色欧美一区二区| 天堂俺去俺来也www色官网| 777米奇影视久久| 久久久久久久久久久免费av| 亚洲三区欧美一区| 欧美精品国产亚洲| 国产精品一区二区在线观看99| 国产乱来视频区| 国产成人精品婷婷| 亚洲av电影在线进入| 青春草国产在线视频| 亚洲综合色网址| 90打野战视频偷拍视频| 精品国产超薄肉色丝袜足j| 高清av免费在线| 色网站视频免费| 亚洲精品中文字幕在线视频| 男女边吃奶边做爰视频| 在线天堂最新版资源| 午夜精品国产一区二区电影|